共 90 条
- [1] Afshar A, 2014, LECT NOTES COMPUT SC, V8441, P387, DOI 10.1007/978-3-642-55220-5_22
- [2] Two Round Information-Theoretic MPC with Malicious Security [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, 2019, 11477 : 532 - 561
- [3] Round-Optimal Secure Multiparty Computation with Honest Majority [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 395 - 424
- [4] A New Approach to Round-Optimal Secure Multiparty Computation [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 468 - 499
- [5] [Anonymous], 2001, FDN CRYPTOGRAPHY
- [6] Applebaum B., 2021, 2021346 CRYPT EPRINT
- [7] Degree 2 is Complete for the Round-Complexity of Malicious MPC [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT II, 2019, 11477 : 504 - 531
- [8] Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-Bounds, and Separations [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 : 727 - 757
- [9] High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 805 - 817
- [10] Asharov G, 2012, LECT NOTES COMPUT SC, V7237, P483, DOI 10.1007/978-3-642-29011-4_29